Learn more:

What is it?

It looks just like a real website, but once you login, it steals your username and password.

How can you avoid it?

Verify before you ratify: if you landed on a webpage that seems suspicious (clicked on a banner or a link that you were sent), make sure you are dealing with the real deal. Look at the URL address and verify that it is written exactly as the official site’s address.

Learn more:

What is it?

An attacker who pretends to be a part of a network connection, stealing information as it passes through. More advanced forms of this attack include Man in the Browser, where an attacker gets between you and the security mechanisms within the browser.

Learn more:

What is it?

A pop-up or page that looks real, but when you type your account or bank details, it steals your information.

How can you avoid it?

Reality check: in mobile devices, fake pages often launch as a pop-up over the browser window. If you are about to enter sensitive information, check the other running apps and make sure you are still typing in your browser on the official page, and not on a phony pop-up.

Learn more:

What is it?

A virus that is downloaded onto your tablet, sometimes bundled with another app, that allows someone to perform attacks remotely.

How can you avoid it?

Strict permissions: every time you install an app, try to limit the access it has to parts of your device. If a wallpaper app or game wants to access your accounts, text messages, contacts, and location, it is very suspicious.

New is not always safe: even if it’s from a trusted source, be suspicious of apps that are less than a month old. Read the app’s reviews to see if other users have had problems with it.

Learn more:

What is it?

Any password that can be guessed on the basis of personal information or doesn’t include special characters or numbers. Even if your password is complex, it can be weak if it hasn’t been changed in a long time.

How can you avoid it?

Your system – your safety: it is much better (and safer) to make up your own system that lets you generate unique, complex passwords. For example you can take any verse that you know by heart and use the first letters of each line to generate a password. Also it’s a good idea to add numbers to your password (like the exact count of words in the used verse) and special symbols.

Learn more:

What is it?

An email, message, or pop-up that directs you to a fake site to steal your sensitive data like login or credit card information.

How can you avoid it?

No sweat: often, phishing messages are designed to make you panic by demanding you urgently to login to fake sites. Check the email address of the sender or make sure that the site is real by cross referencing the original contact or site.

What is it?

A program used by an attacker that reads pieces of data as it flows through a network.

How can you avoid it?

Speak in code: encrypting the data that you send and receive will ensure that an attacker can’t read it. Use a VPN (Virtual Personal Network) available on browsers like Tor, that can automatically encrypt your data to keep you protected.